General

  • Target

    skuld.exe

  • Size

    9.4MB

  • Sample

    240812-zn5qsatfma

  • MD5

    19eefcece096efb65ef09734a0aa16be

  • SHA1

    15e71662f2e568f0338f35ee847c02891d2a7d4d

  • SHA256

    fd6619de7c16d616f754131fb87ce6707cdd244fff372ae5cc093db5120ffade

  • SHA512

    16964a451c2ad5d293c2ee3f44c57be63aa62293c8a6192b56f56b5566f2c3310bb6492997b69f87aadeabbc72434dd1af5720b0d4bb424d99ee6e8322502425

  • SSDEEP

    98304:hgN03vyx0HDD2a/gIZ7e8+SQkEA3GO7XVIEV:hHfi0H/Z7e87QdIoy

Malware Config

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1272658049139740762/_NxXfvdGz0aZ9666v_PxolC_V6S4N6PC_rscIqXUVzC_4Ave_8apEz_h8Gn0qKsX06Yk

Targets

    • Target

      skuld.exe

    • Size

      9.4MB

    • MD5

      19eefcece096efb65ef09734a0aa16be

    • SHA1

      15e71662f2e568f0338f35ee847c02891d2a7d4d

    • SHA256

      fd6619de7c16d616f754131fb87ce6707cdd244fff372ae5cc093db5120ffade

    • SHA512

      16964a451c2ad5d293c2ee3f44c57be63aa62293c8a6192b56f56b5566f2c3310bb6492997b69f87aadeabbc72434dd1af5720b0d4bb424d99ee6e8322502425

    • SSDEEP

      98304:hgN03vyx0HDD2a/gIZ7e8+SQkEA3GO7XVIEV:hHfi0H/Z7e87QdIoy

    • Skuld stealer

      An info stealer written in Go lang.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks